EP3451265A1 - Mobile payment method and apparatus - Google Patents
Mobile payment method and apparatus Download PDFInfo
- Publication number
- EP3451265A1 EP3451265A1 EP17788579.5A EP17788579A EP3451265A1 EP 3451265 A1 EP3451265 A1 EP 3451265A1 EP 17788579 A EP17788579 A EP 17788579A EP 3451265 A1 EP3451265 A1 EP 3451265A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- fingerprint verification
- fingerprint
- mobile payment
- payment terminal
- contact application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the present disclosure relates to mobile payment technology, and in particular to a mobile payment method and device based on a near field communication function, which can seamlessly switch between a fingerprint verification mode and a non-fingerprint verification mode.
- NFC near field communication
- eSE embedded security element
- the present disclosure provides a mobile payment method and device based on near field communication function, which can be simultaneously adapted to mobile payment scenes under a secure protection mechanism and an insecure protection mechanism, and can realize seamless switch between the two, thus providing good user experience.
- a mobile payment method including the following steps:
- the fingerprint verification process is executed before it is determined that the designated non-contact application supports the fingerprint verification mode.
- the fingerprint verification process is executed after it is determined that the designated non-contact application supports the fingerprint verification mode.
- the mobile payment terminal determines whether the designated non-contact application supports the fingerprint verification mode by accessing an application registry, and the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information including an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- the step of determining by the mobile payment terminal whether the fingerprint verification is passed includes:
- a mobile payment terminal including:
- the mobile payment terminal is a mobile phone.
- the embedded security element further includes an application registry that can be accessed by the fingerprint triggering module, wherein the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information including an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- the embedded security element further includes a fingerprint identification processing module which is configured to update the status flag in the application registry based on a result of fingerprint verification of the fingerprint verification unit.
- the fingerprint triggering module is configured to determine whether the fingerprint verification is passed in the following manner:
- the designated non-contact application runs in the embedded security element.
- the initialization process of the non-contact protocol of near field communication is executed independently of the secure application mechanism such as fingerprint verification.
- a mobile payment terminal such as a mobile phone
- an external device e.g., a POS machine, a subway gate, a bus card reader, etc.
- the NFC function is activated to complete the initialization process of the non-contact protocol, regardless of whether an identity verification process such as fingerprint verification has been passed.
- the external device identifies the mobile payment terminal, a non-contact command is sent to the mobile payment terminal to instruct the mobile payment terminal to run a corresponding non-contact application, thereby completing the payment operation.
- fingerprint identification information is used to indicate whether a non-contact application supports a fingerprint verification mode and whether fingerprint verification is passed when the fingerprint verification mode is supported.
- the fingerprint identification information of a non-contact application includes an identifier indicating whether the non-contact application supports a fingerprint verification mode and a status flag indicating whether the fingerprint verification has been passed when the fingerprint verification mode is supported.
- different values of the same parameter can be used to indicate the identifier and the status of the status flag.
- an information byte can be used to indicate various statuses, wherein the value "0" indicates a status in which a non-contact application does not support fingerprint identification, the value “1” indicates a status in which the non-contact application supports fingerprint identification but the fingerprint verification process has not yet been executed, the value "2" indicates a status in which the non-contact application supports fingerprint identification and the fingerprint verification process is passed, and the value "3" indicates a status in which the non-contact application supports fingerprint verification and the fingerprint verification process is not passed.
- the fingerprint identification information can be saved in the registration information table, and the registration information table can be saved in the embedded security element (eSE) together with the non-contact application.
- the eSE when the eSE receives the non-contact application selection command of the external device, it will directly return the execution result of the non-contact application to the external device, thereby completing the subsequent application interaction process with the external device.
- the eSE For a non-contact application that supports fingerprint verification, when the eSE receives the non-contact application selection command of the external device, if the fingerprint identification information indicates that the fingerprint verification is not passed, the eSE returns an error message indicating that the non-contact application does not exist to the external device, and the external device will not be able to select the non-contact application, so that the subsequent application interaction process cannot be completed. If the fingerprint identification information indicates that the fingerprint verification is passed, the eSE will return the execution result of the non-contact application to the external device, and complete subsequent application interaction process with the external device. After the application interaction process is completed, the fingerprint identification information of the non-contact application is reset to be a status in which the fingerprint verification is not passed.
- the user can actively enter a fingerprint for fingerprint verification before swiping the card so as to update the fingerprint identification information of the non-contact application, or when the card is swiped close to the external device, the eSE triggers and awakens a fingerprint client on the mobile payment terminal, and the user is prompted to enter a fingerprint, thereby completing fingerprint verification of the non-contact application.
- FIG. 1 is a schematic structural diagram of a mobile payment terminal according to an embodiment of the present disclosure.
- a mobile phone and a POS machine are herein taken as the examples of the mobile payment terminal and the external device respectively.
- a mobile phone 10 which serves as the mobile payment terminal, includes a near field communication (NFC) unit 110, a fingerprint verification unit 120 and an embedded security element 130.
- NFC near field communication
- the near field communication unit 110 is configured to execute a non-contact protocol initialization process between the mobile payment terminal and a POS machine 20 of the external device, receive a selection command from the POS machine, and return an execution result of the non-contact application to the POS machine, wherein the selection command designates the non-contact application running in the mobile payment terminal. Moreover, the near field communication unit 110 is further configured to couple with the fingerprint verification unit 120 to trigger the operation of the fingerprint verification unit 120, and couple with the embedded security element 130 to serve as a communication interface used in an interaction process of the non-contact application and the POS machine.
- the fingerprint verification unit 120 includes a fingerprint client 121, a fingerprint verification processing module 122 and a fingerprint trigger monitoring module 123.
- the fingerprint client 121 is responsible for running a fingerprint entry application which is configured to, in response to a command of the fingerprint trigger monitoring module 123, activate a process of fingerprint verification processing of the fingerprint verification processing module 122 and display a prompt interface for fingerprint entry.
- the fingerprint verification processing module 122 is configured to verify whether the fingerprint entered by the user matches with a reference object in response to the activation command from the fingerprint client 121, and update the fingerprint identification information of the currently selected non-contact application according to the verification result. For example, as described above, if the fingerprint verification is passed, the status flag is updated from "1" to "2", and if the fingerprint verification is not passed, the status flag is updated from "1" to "3".
- the fingerprint verification processing module 122 transmits the updated fingerprint identification information to the embedded security element (eSE) 130.
- the fingerprint verification processing module 122 generally requires security protection, so it typically operates in a secure environment (e.g., TEE) provided by the mobile phone.
- the fingerprint trigger monitoring module 123 is configured to activate the fingerprint client 121 to execute the above operation in response to a fingerprint calling command of the embedded security element 130 monitored by the near field communication unit 110.
- the embedded security element130 includes a fingerprint triggering module 131, a fingerprint identification processing module 132, an application distribution module 133, and a storage area 134 that saves the non-contact application and application registry.
- the fingerprint triggering module 131 is configured to, in response to the non-contact application selection command received from the POS machine 20 via the near field communication unit 110, determine whether the selected non-contact application supports fingerprint verification and whether fingerprint verification is passed. If the fingerprint verification is supported and the fingerprint verification has not been passed, the fingerprint triggering module 131 sends a fingerprint calling command to the fingerprint trigger monitoring module 123 via the near field communication unit 110, and the fingerprint trigger monitoring module 123 triggers the fingerprint client 121 to present a prompt for entering the fingerprint to the user, and triggers the fingerprint verification processing module 122 to verify whether the fingerprint entered by the user matches with the reference object and updates the fingerprint identification information of the currently selected non-contact application.
- the fingerprint identification processing module 132 is configured to, in response to a fingerprint information update command returned by the fingerprint verification processing module 122, access the storage area 134 to look up and update the fingerprint identification information of the current non-contact application in the application registry.
- the application distribution module 133 is configured to directly activate the corresponding non-contact application to operate inside the embedded security element, when the selected non-contact application does not support fingerprint verification. When the selected non-contact application supports fingerprint verification, if it is determined that the fingerprint verification is passed according to the fingerprint identification information, then the corresponding non-contact application is activated and runs in the embedded security element.
- FIG. 2 is a flowchart of a mobile payment method according to an embodiment of the present disclosure.
- an application scene is involved in which the user uses a mobile phone payment application supporting fingerprint verification to swipe the card on the POS machine, and the user actively enters the fingerprint before the non-contact protocol initialization process is executed.
- the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown in FIG. 1 .
- the method is not limited to being implemented by a device having a particular structure.
- the process shown in FIG. 2 includes the following steps.
- step 201 before the card is swiped, since the non-contact application knowing that the card is to be swiped requires fingerprint verification, the user actively opens the fingerprint client 121 on the mobile phone, selects the designated non-contact application, and enters the fingerprint according to a prompt.
- step 202 the fingerprint verification processing module 122 compares the fingerprint entered by the user with a reference fingerprint in response to a command of the fingerprint client 121.
- step 203 the fingerprint verification processing module 122 updates the fingerprint identification information of the application according to the comparison result and sends a command of updating application fingerprint identification to the fingerprint identification processing module 132.
- step 204 the fingerprint identification processing module 132 updates the fingerprint identification information in the application registry of the selected non-contact application according to the received command of updating fingerprint identification.
- step 205 the fingerprint identification processing module 132 returns a message indicating that the update was successful to the fingerprint verification processing module 122.
- step 206 if the fingerprint verification is passed, the fingerprint verification processing module 122 returns a message indicating that the fingerprint verification is passed to the fingerprint client 121.
- step 207 the fingerprint client 121 prompts the user to take the mobile phone to swipe the card on the POS machine.
- step 208 the fingerprint identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit.
- step 209 the fingerprint identification processing module 132 obtains fingerprint identification information of the application from the application registry.
- the fingerprint identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information. Specifically, in a case where the selected non-contact application has passed fingerprint verification and the selected non-contact application does not support fingerprint verification, the fingerprint identification processing module 132 forwards the non-contact application selection command to the application distribution module 133; in a case where fingerprint verification has not yet been conducted for the selected non-contact application, the fingerprint identification processing module 132 instructs the fingerprint triggering module 131 to initiate a fingerprint verification process, which will be described in detail below with reference to FIG. 3 ; and in a case where the selected non-contact application has not passed fingerprint verification, the fingerprint identification processing module 132 will prevent the non-contact application selection command from being forwarded to the application distribution module 133. In the present embodiment, since the previous fingerprint verification was passed, the fingerprint identification processing module 132 forwards the non-contact application selection command to the application distribution module 133.
- step 211 the application distribution module 133 selects the designated application to run in the embedded security element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprint identification processing module 132.
- step 212 the fingerprint identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embedded security element 130, thereby completing the payment process of the user swiping the card.
- FIG. 3 is a flowchart of a mobile payment method according to another embodiment of the present disclosure.
- an application scene is involved in which the user uses a mobile phone payment application supporting fingerprint verification to swipe the card on the POS machine, and the user actively enters the fingerprint after the non-contact protocol initialization process is executed.
- the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown in FIG. 1 .
- the method is not limited to being implemented by a device having a particular structure.
- the process shown in FIG. 3 includes the following steps.
- step 301 the fingerprint identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit.
- step 302 the fingerprint identification processing module 132 obtains fingerprint identification information of the application from the application registry.
- step 303 the fingerprint identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information.
- the fingerprint identification processing module 132 since the selected non-contact application supports fingerprint verification but has not yet performed fingerprint verification, the fingerprint identification processing module 132 sends an instruction to the fingerprint triggering module 131 to start the fingerprint verification process.
- step 304 the fingerprint triggering module 131 sends the instruction to start the fingerprint verification process to the fingerprint trigger monitoring module 123 via the near field communication unit 110.
- step 305 the fingerprint trigger monitoring module 123 wakes up the fingerprint client 121, and instructs the fingerprint client 121 to start the fingerprint verification process.
- step 306 the fingerprint client 121 prompts for entry of the fingerprint and activates the fingerprint verification processing module 122.
- step 307 the fingerprint verification processing module 122 compares the fingerprint entered by the user with a reference fingerprint in response to the command of the fingerprint client 121, updates the fingerprint identification information of the application according to the comparison result, and sends a command of updating application fingerprint identification to the fingerprint identification processing module 132.
- step 308 the fingerprint identification processing module 132 updates the fingerprint identification information of the selected non-contact application in the application registry according to the received command of updating fingerprint identification.
- step 309 if the fingerprint verification is passed, the fingerprint identification processing module 132 forwards the non-contact application selection command to the application distribution module 133; otherwise, the non-contact application selection command is prevented from being forwarded to the application distribution module 133.
- step 310 the application distribution module 133 selects the designated application to run in the embedded security element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprint identification processing module 132.
- step 311 the fingerprint identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embedded security element 130, thereby completing the payment process of the user swiping the card.
- the fingerprint identification information of the non-contact application needs to be reset to a status in which the fingerprint verification is not executed, which can be completed in the following manner: as soon as the fingerprint identification processing module 132 receives the command to update the fingerprint identification information from the fingerprint verification processing module 122, a timer is activated, and when the timing is reached, the fingerprint identification processing module 132 needs to reset the fingerprint identification information of the non-contact application to a status in which the fingerprint verification is not performed.
- FIG. 4 is a flowchart of a mobile payment method according to another embodiment of the present disclosure.
- an application scene is involved in which the user uses a mobile phone payment application which does not support fingerprint verification to swipe the card on a bus terminal.
- the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown in FIG. 1 .
- the method is not limited to being implemented by a device having a particular structure.
- the process shown in FIG. 4 includes the following steps.
- step 401 the fingerprint identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit.
- step 402 the fingerprint identification processing module 132 obtains fingerprint identification information of the application from the application registry.
- step 403 the fingerprint identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information.
- the fingerprint identification processing module 132 since the selected non-contact application does not support fingerprint verification, the fingerprint identification processing module 132 forwards the non-contact application selection command to the application distribution module 133.
- step 404 the application distribution module 133 selects the designated application to run in the embedded security element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprint identification processing module 132.
- step 405 the fingerprint identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embedded security element 130, thereby completing the payment process of the user swiping the card.
- the technical advantage of the present disclosure is that the fingerprint verification mode and the non-fingerprint verification mode can be seamlessly switched, thereby providing a good user experience to the non-fingerprint verification mode at the same time of ensuring the convenient and friendly user experience of the fingerprint payment.
Abstract
Description
- The present disclosure relates to mobile payment technology, and in particular to a mobile payment method and device based on a near field communication function, which can seamlessly switch between a fingerprint verification mode and a non-fingerprint verification mode.
- With the wide application of near field communication (NFC) function, fingerprint verification and embedded security element (eSE) on mobile phones, the mobile payment methods combining these three functions are becoming more and more popular in the market. A typical representative is the Apple Pay of Apple Inc. In this fingerprint payment mode, fingerprint verification can ensure that the current cardholder is a legitimate cardholder, thereby protecting the security when the cardholder swipes the card.
- The above mobile payment methods are user-friendly for non-contact applications that require fingerprint verification. However, there are deficiencies when it comes to non-contact application scenes that support both security verification and non-security verification. For example, in addition to supporting non-contact payment with bank cards, mobile phones usually support bus card applications. Bank card payment requires secure protection mechanisms such as fingerprint verification for security reasons, thereby sacrificing the processing speed to a certain extent is acceptable to the user; while for bus card applications, due to the frequency of use, the rapidity in swiping the card and the small amount of money, the provision of secure protection mechanism will decrease the speed of card swiping, thereby greatly affecting the user experience.
- It can be seen from the above that there is an urgent need to provide a mobile payment technology on a mobile phone, which can be simultaneously adapted to the characteristics of the above two types of application scenes.
- The present disclosure provides a mobile payment method and device based on near field communication function, which can be simultaneously adapted to mobile payment scenes under a secure protection mechanism and an insecure protection mechanism, and can realize seamless switch between the two, thus providing good user experience.
- According to an aspect of the present disclosure, a mobile payment method is provided, including the following steps:
- executing a non-contact protocol initialization process between a mobile payment terminal and an external device by the mobile payment terminal;
- receiving a selection command from the external device by the mobile payment terminal, the selection command designating a non-contact application;
- determining, by the mobile payment terminal, whether the designated non-contact application supports a fingerprint verification mode;
- determining, by the mobile payment terminal, whether the designated non-contact application has passed the fingerprint verification, if the fingerprint verification mode is supported; and
- running the designated non-contact application by the mobile payment terminal to execute a payment operation, if the designated non-contact application has passed fingerprint verification or does not support the fingerprint verification mode,
- wherein the execution of the non-contact protocol initialization process is independent of the execution of the fingerprint verification process.
- Preferably, in the above method, the fingerprint verification process is executed before it is determined that the designated non-contact application supports the fingerprint verification mode.
- Preferably, in the above method, the fingerprint verification process is executed after it is determined that the designated non-contact application supports the fingerprint verification mode.
- Preferably, in the above method, the mobile payment terminal determines whether the designated non-contact application supports the fingerprint verification mode by accessing an application registry, and the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information including an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- Preferably, in the above method, the step of determining by the mobile payment terminal whether the fingerprint verification is passed includes:
- a) reading the status flag;
- b) if the status flag is a first set value, determining that the designated non-contact application has passed the fingerprint verification, and if the status flag is a second set value, determining that the designated non-contact application has not passed the fingerprint verification;
- c) if the status flag is a third set value, executing a fingerprint verification process and repeating steps a) and b), wherein in the process of executing fingerprint verification, if the fingerprint verification is passed, the status flag is set at the first set value, otherwise it is set at the second set value; and
- d) resetting the status flag at a third set value after the status flag has been set at the first set value or the second set value for a preset period of time.
- According to an aspect of the present disclosure, a mobile payment terminal is also provided, including:
- a near-field communication unit, configured to execute a non-contact protocol initialization process between the mobile payment terminal and an external device, and receive a selection command from the external device, the selection command designating a non-contact application running in the mobile payment terminal;
- a fingerprint verification unit, configured to execute a fingerprint verification process; and
- an embedded security element, which includes a fingerprint triggering module configured to:
- determine whether the designated non-contact application supports a fingerprint verification mode;
- determine whether the designated non-contact application has passed the fingerprint verification, if the fingerprint verification mode is supported; and
- instruct running the designated non-contact application in the mobile payment terminal to execute a payment operation, if the designated non-contact application has passed fingerprint verification or does not support the fingerprint verification mode,
- wherein the execution of the non-contact protocol initialization process is independent of the execution of the fingerprint verification process.
- Preferably, the mobile payment terminal is a mobile phone.
- Preferably, in the above mobile payment terminal, the embedded security element further includes an application registry that can be accessed by the fingerprint triggering module, wherein the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information including an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- Preferably, in the above mobile payment terminal, the embedded security element further includes a fingerprint identification processing module which is configured to update the status flag in the application registry based on a result of fingerprint verification of the fingerprint verification unit.
- Preferably, in the above mobile payment terminal, the fingerprint triggering module is configured to determine whether the fingerprint verification is passed in the following manner:
- a) reading the status flag;
- b) if the status flag is a first set value, determining that the designated non-contact application has passed the fingerprint verification, and if the status flag is a second set value, determining that the designated non-contact application has not passed the fingerprint verification;
- c) if the status flag is a third set value, executing a fingerprint verification process and repeating steps a) and b), wherein in the process of executing fingerprint verification, if the fingerprint verification is passed, the status flag is set at the first set value by the fingerprint identification processing module, otherwise it is set at the second set value by the fingerprint identification processing module; and
- d) resetting the status flag at a third set value by the fingerprint identification processing module after the status flag has been set at the first set value or the second set value for a preset period of time.
- Preferably, in the above mobile payment terminal, the designated non-contact application runs in the embedded security element.
- The above and/or other aspects and advantages of the present disclosure will become more clearly and easily understood from the following description in conjunction with several aspects of the accompanying drawings. In the drawings, identical or similar elements are denoted by identical reference signs, in which:
-
FIG. 1 is a schematic structural diagram of a mobile payment terminal according to an embodiment of the present disclosure. -
FIG. 2 is a flowchart of a mobile payment method according to an embodiment of the present disclosure. -
FIG. 3 is a flowchart of a mobile payment method according to another embodiment of the present disclosure. -
FIG. 4 is a flowchart of a mobile payment method according to further another embodiment of the present disclosure. - The present disclosure will now be described more fully hereinafter with reference to the accompanying drawings in which the illustrative embodiments of the present disclosure are shown. However, the present disclosure may be embodied in different forms and should not be construed as being limited to the various embodiments set forth herein. The above-described embodiments are intended to make the disclosure complete and thorough so as to convey the scope of protection of the present disclosure to those skilled in the art.
- The use of the terms "include" and "comprise" means that the in addition to the units and steps directly and explicitly recited in the specification and claims, the technical solutions of the present disclosure do not exclude situations including other units and steps that are not directly or explicitly recited.
- According to an aspect of the present disclosure, the initialization process of the non-contact protocol of near field communication (NFC) is executed independently of the secure application mechanism such as fingerprint verification. In an embodiment, when a mobile payment terminal such as a mobile phone is close to an external device (e.g., a POS machine, a subway gate, a bus card reader, etc.), the NFC function is activated to complete the initialization process of the non-contact protocol, regardless of whether an identity verification process such as fingerprint verification has been passed. When the external device identifies the mobile payment terminal, a non-contact command is sent to the mobile payment terminal to instruct the mobile payment terminal to run a corresponding non-contact application, thereby completing the payment operation.
- According to another aspect of the present disclosure, in order to distinguish a non-contact application based on a secure protection mechanism from a non-contact application based on an insecure protection mechanism, fingerprint identification information is used to indicate whether a non-contact application supports a fingerprint verification mode and whether fingerprint verification is passed when the fingerprint verification mode is supported. Preferably, the fingerprint identification information of a non-contact application includes an identifier indicating whether the non-contact application supports a fingerprint verification mode and a status flag indicating whether the fingerprint verification has been passed when the fingerprint verification mode is supported. Preferably, different values of the same parameter can be used to indicate the identifier and the status of the status flag. For example, an information byte can be used to indicate various statuses, wherein the value "0" indicates a status in which a non-contact application does not support fingerprint identification, the value "1" indicates a status in which the non-contact application supports fingerprint identification but the fingerprint verification process has not yet been executed, the value "2" indicates a status in which the non-contact application supports fingerprint identification and the fingerprint verification process is passed, and the value "3" indicates a status in which the non-contact application supports fingerprint verification and the fingerprint verification process is not passed. The fingerprint identification information can be saved in the registration information table, and the registration information table can be saved in the embedded security element (eSE) together with the non-contact application.
- For a non-contact application that does not support fingerprint verification, when the eSE receives the non-contact application selection command of the external device, it will directly return the execution result of the non-contact application to the external device, thereby completing the subsequent application interaction process with the external device.
- For a non-contact application that supports fingerprint verification, when the eSE receives the non-contact application selection command of the external device, if the fingerprint identification information indicates that the fingerprint verification is not passed, the eSE returns an error message indicating that the non-contact application does not exist to the external device, and the external device will not be able to select the non-contact application, so that the subsequent application interaction process cannot be completed. If the fingerprint identification information indicates that the fingerprint verification is passed, the eSE will return the execution result of the non-contact application to the external device, and complete subsequent application interaction process with the external device. After the application interaction process is completed, the fingerprint identification information of the non-contact application is reset to be a status in which the fingerprint verification is not passed. In a specific application scene, for a non-contact application that supports fingerprint verification, the user can actively enter a fingerprint for fingerprint verification before swiping the card so as to update the fingerprint identification information of the non-contact application, or when the card is swiped close to the external device, the eSE triggers and awakens a fingerprint client on the mobile payment terminal, and the user is prompted to enter a fingerprint, thereby completing fingerprint verification of the non-contact application.
- Embodiments for carrying out the present disclosure will be described below by means of the drawings.
-
FIG. 1 is a schematic structural diagram of a mobile payment terminal according to an embodiment of the present disclosure. Illustratively, a mobile phone and a POS machine are herein taken as the examples of the mobile payment terminal and the external device respectively. - As shown in
FIG. 1 , amobile phone 10, which serves as the mobile payment terminal, includes a near field communication (NFC)unit 110, afingerprint verification unit 120 and an embeddedsecurity element 130. - The near
field communication unit 110 is configured to execute a non-contact protocol initialization process between the mobile payment terminal and aPOS machine 20 of the external device, receive a selection command from the POS machine, and return an execution result of the non-contact application to the POS machine, wherein the selection command designates the non-contact application running in the mobile payment terminal. Moreover, the nearfield communication unit 110 is further configured to couple with thefingerprint verification unit 120 to trigger the operation of thefingerprint verification unit 120, and couple with the embeddedsecurity element 130 to serve as a communication interface used in an interaction process of the non-contact application and the POS machine. - With reference to
FIG. 1 , thefingerprint verification unit 120 includes afingerprint client 121, a fingerprintverification processing module 122 and a fingerprinttrigger monitoring module 123. - The
fingerprint client 121 is responsible for running a fingerprint entry application which is configured to, in response to a command of the fingerprinttrigger monitoring module 123, activate a process of fingerprint verification processing of the fingerprintverification processing module 122 and display a prompt interface for fingerprint entry. The fingerprintverification processing module 122 is configured to verify whether the fingerprint entered by the user matches with a reference object in response to the activation command from thefingerprint client 121, and update the fingerprint identification information of the currently selected non-contact application according to the verification result. For example, as described above, if the fingerprint verification is passed, the status flag is updated from "1" to "2", and if the fingerprint verification is not passed, the status flag is updated from "1" to "3". The fingerprintverification processing module 122 transmits the updated fingerprint identification information to the embedded security element (eSE) 130. The fingerprintverification processing module 122 generally requires security protection, so it typically operates in a secure environment (e.g., TEE) provided by the mobile phone. The fingerprinttrigger monitoring module 123 is configured to activate thefingerprint client 121 to execute the above operation in response to a fingerprint calling command of the embeddedsecurity element 130 monitored by the nearfield communication unit 110. - With continued reference to
FIG. 1 , the embedded security element130 includes afingerprint triggering module 131, a fingerprintidentification processing module 132, anapplication distribution module 133, and astorage area 134 that saves the non-contact application and application registry. - The
fingerprint triggering module 131 is configured to, in response to the non-contact application selection command received from thePOS machine 20 via the nearfield communication unit 110, determine whether the selected non-contact application supports fingerprint verification and whether fingerprint verification is passed. If the fingerprint verification is supported and the fingerprint verification has not been passed, thefingerprint triggering module 131 sends a fingerprint calling command to the fingerprinttrigger monitoring module 123 via the nearfield communication unit 110, and the fingerprinttrigger monitoring module 123 triggers thefingerprint client 121 to present a prompt for entering the fingerprint to the user, and triggers the fingerprintverification processing module 122 to verify whether the fingerprint entered by the user matches with the reference object and updates the fingerprint identification information of the currently selected non-contact application. The fingerprintidentification processing module 132 is configured to, in response to a fingerprint information update command returned by the fingerprintverification processing module 122, access thestorage area 134 to look up and update the fingerprint identification information of the current non-contact application in the application registry. Theapplication distribution module 133 is configured to directly activate the corresponding non-contact application to operate inside the embedded security element, when the selected non-contact application does not support fingerprint verification. When the selected non-contact application supports fingerprint verification, if it is determined that the fingerprint verification is passed according to the fingerprint identification information, then the corresponding non-contact application is activated and runs in the embedded security element. -
FIG. 2 is a flowchart of a mobile payment method according to an embodiment of the present disclosure. Exemplarily, in this embodiment, an application scene is involved in which the user uses a mobile phone payment application supporting fingerprint verification to swipe the card on the POS machine, and the user actively enters the fingerprint before the non-contact protocol initialization process is executed. For convenience of explanation, the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown inFIG. 1 . However, it should be noted that the method is not limited to being implemented by a device having a particular structure. - The process shown in
FIG. 2 includes the following steps. - In step 201: before the card is swiped, since the non-contact application knowing that the card is to be swiped requires fingerprint verification, the user actively opens the
fingerprint client 121 on the mobile phone, selects the designated non-contact application, and enters the fingerprint according to a prompt. - In step 202: the fingerprint
verification processing module 122 compares the fingerprint entered by the user with a reference fingerprint in response to a command of thefingerprint client 121. - In step 203: the fingerprint
verification processing module 122 updates the fingerprint identification information of the application according to the comparison result and sends a command of updating application fingerprint identification to the fingerprintidentification processing module 132. - In step 204: the fingerprint
identification processing module 132 updates the fingerprint identification information in the application registry of the selected non-contact application according to the received command of updating fingerprint identification. - In step 205: the fingerprint
identification processing module 132 returns a message indicating that the update was successful to the fingerprintverification processing module 122. - In step 206: if the fingerprint verification is passed, the fingerprint
verification processing module 122 returns a message indicating that the fingerprint verification is passed to thefingerprint client 121. - In step 207: the
fingerprint client 121 prompts the user to take the mobile phone to swipe the card on the POS machine. - In step 208: the fingerprint
identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit. - In step 209: the fingerprint
identification processing module 132 obtains fingerprint identification information of the application from the application registry. - In step 210: the fingerprint
identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information. Specifically, in a case where the selected non-contact application has passed fingerprint verification and the selected non-contact application does not support fingerprint verification, the fingerprintidentification processing module 132 forwards the non-contact application selection command to theapplication distribution module 133; in a case where fingerprint verification has not yet been conducted for the selected non-contact application, the fingerprintidentification processing module 132 instructs thefingerprint triggering module 131 to initiate a fingerprint verification process, which will be described in detail below with reference toFIG. 3 ; and in a case where the selected non-contact application has not passed fingerprint verification, the fingerprintidentification processing module 132 will prevent the non-contact application selection command from being forwarded to theapplication distribution module 133. In the present embodiment, since the previous fingerprint verification was passed, the fingerprintidentification processing module 132 forwards the non-contact application selection command to theapplication distribution module 133. - In step 211: the
application distribution module 133 selects the designated application to run in the embeddedsecurity element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprintidentification processing module 132. - In step 212: the fingerprint
identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embeddedsecurity element 130, thereby completing the payment process of the user swiping the card. -
FIG. 3 is a flowchart of a mobile payment method according to another embodiment of the present disclosure. Exemplarily, in this embodiment, an application scene is involved in which the user uses a mobile phone payment application supporting fingerprint verification to swipe the card on the POS machine, and the user actively enters the fingerprint after the non-contact protocol initialization process is executed. For convenience of explanation, the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown inFIG. 1 . However, it should be noted that the method is not limited to being implemented by a device having a particular structure. - The process shown in
FIG. 3 includes the following steps. - In step 301: the fingerprint
identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit. - In step 302: the fingerprint
identification processing module 132 obtains fingerprint identification information of the application from the application registry. - In step 303: the fingerprint
identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information. In this embodiment, since the selected non-contact application supports fingerprint verification but has not yet performed fingerprint verification, the fingerprintidentification processing module 132 sends an instruction to thefingerprint triggering module 131 to start the fingerprint verification process. - In step 304: the
fingerprint triggering module 131 sends the instruction to start the fingerprint verification process to the fingerprinttrigger monitoring module 123 via the nearfield communication unit 110. - In step 305: the fingerprint
trigger monitoring module 123 wakes up thefingerprint client 121, and instructs thefingerprint client 121 to start the fingerprint verification process. - In step 306: the
fingerprint client 121 prompts for entry of the fingerprint and activates the fingerprintverification processing module 122. - In step 307: the fingerprint
verification processing module 122 compares the fingerprint entered by the user with a reference fingerprint in response to the command of thefingerprint client 121, updates the fingerprint identification information of the application according to the comparison result, and sends a command of updating application fingerprint identification to the fingerprintidentification processing module 132. - In step 308: the fingerprint
identification processing module 132 updates the fingerprint identification information of the selected non-contact application in the application registry according to the received command of updating fingerprint identification. - In step 309: if the fingerprint verification is passed, the fingerprint
identification processing module 132 forwards the non-contact application selection command to theapplication distribution module 133; otherwise, the non-contact application selection command is prevented from being forwarded to theapplication distribution module 133. - In step 310: the
application distribution module 133 selects the designated application to run in the embeddedsecurity element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprintidentification processing module 132. - In step 311: the fingerprint
identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embeddedsecurity element 130, thereby completing the payment process of the user swiping the card. - In the above embodiment supporting fingerprint verification, after the non-contact application interaction is completed, the fingerprint identification information of the non-contact application needs to be reset to a status in which the fingerprint verification is not executed, which can be completed in the following manner: as soon as the fingerprint
identification processing module 132 receives the command to update the fingerprint identification information from the fingerprintverification processing module 122, a timer is activated, and when the timing is reached, the fingerprintidentification processing module 132 needs to reset the fingerprint identification information of the non-contact application to a status in which the fingerprint verification is not performed. -
FIG. 4 is a flowchart of a mobile payment method according to another embodiment of the present disclosure. Exemplarily, in this embodiment, an application scene is involved in which the user uses a mobile phone payment application which does not support fingerprint verification to swipe the card on a bus terminal. For convenience of explanation, the mobile payment method of the present embodiment is implemented by means of the mobile payment terminal shown inFIG. 1 . However, it should be noted that the method is not limited to being implemented by a device having a particular structure. - The process shown in
FIG. 4 includes the following steps. - In step 401: the fingerprint
identification processing module 132 receives a non-contact application selection command sent by the POS machine via the near field communication unit. - In step 402: the fingerprint
identification processing module 132 obtains fingerprint identification information of the application from the application registry. - In step 403: the fingerprint
identification processing module 132 determines the processing manner of the next step according to the fingerprint identification information. In this embodiment, since the selected non-contact application does not support fingerprint verification, the fingerprintidentification processing module 132 forwards the non-contact application selection command to theapplication distribution module 133. - In step 404: the
application distribution module 133 selects the designated application to run in the embeddedsecurity element 130 according to the non-contact application selection command, and returns a message indicating that the application selection was successful to the fingerprintidentification processing module 132. - In step 405: the fingerprint
identification processing module 132 forwards the message indicating that the application selection was successful to the POS machine so that the POS machine executes a subsequent application interaction command with the non-contact application running on the embeddedsecurity element 130, thereby completing the payment process of the user swiping the card. - While the above embodiments are all described based on a mobile phone of a physical eSE, these embodiments are also applicable to mobile payment terminals having a similar function to eSE (e.g., a mobile phone supporting HCE function).
- The technical advantage of the present disclosure is that the fingerprint verification mode and the non-fingerprint verification mode can be seamlessly switched, thereby providing a good user experience to the non-fingerprint verification mode at the same time of ensuring the convenient and friendly user experience of the fingerprint payment.
- While various exemplary embodiments have been shown and described, it will be understood by those skilled in the art that various changes can be made to these exemplary embodiments in terms of the form and detail without departing from the spirit and form of the concept of the present disclosure as defined by the appended claims.
Claims (11)
- A mobile payment method, comprising the following steps:executing a non-contact protocol initialization process between a mobile payment terminal and an external device by the mobile payment terminal;receiving a selection command from the external device by the mobile payment terminal, the selection command designating a non-contact application;determining, by the mobile payment terminal, whether the designated non-contact application supports a fingerprint verification mode;determining, by the mobile payment terminal, whether the designated non-contact application has passed the fingerprint verification, if the fingerprint verification mode is supported; andrunning the designated non-contact application by the mobile payment terminal to execute a payment operation, if the designated non-contact application has passed fingerprint verification or does not support the fingerprint verification mode,wherein the execution of the non-contact protocol initialization process is independent of the execution of the fingerprint verification process.
- The method according to claim 1, wherein the fingerprint verification process is executed before it is determined that the designated non-contact application supports the fingerprint verification mode.
- The method according to claim 1, wherein the fingerprint verification process is executed after it is determined that the designated non-contact application supports the fingerprint verification mode.
- The method according to claim 1, wherein the mobile payment terminal determines whether the designated non-contact application supports the fingerprint verification mode by accessing an application registry, and the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information comprising an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- The method according to claim 4, wherein the step of determining by the mobile payment terminal whether the fingerprint verification is passed comprises:a) reading the status flag;b) if the status flag is a first set value, determining that the designated non-contact application has passed the fingerprint verification, and if the status flag is a second set value, determining that the designated non-contact application has not passed the fingerprint verification;c) if the status flag is a third set value, executing a fingerprint verification process and repeating steps a) and b), wherein in the process of executing fingerprint verification, if the fingerprint verification is passed, the status flag is set at the first set value, otherwise it is set at the second set value; andd) resetting the status flag at a third set value after the status flag has been set at the first set value or the second set value for a preset period of time.
- A mobile payment terminal, comprising:a near-field communication unit, configured to execute a non-contact protocol initialization process between the mobile payment terminal and an external device, and receive a selection command from the external device, the selection command designating a non-contact application running in the mobile payment terminal;a fingerprint verification unit, configured to execute a fingerprint verification process; andan embedded security element, which comprises a fingerprint triggering module configured to:wherein the execution of the non-contact protocol initialization process is independent of the execution of the fingerprint verification process.determine whether the designated non-contact application supports a fingerprint verification mode;determine whether the designated non-contact application has passed the fingerprint verification, if the fingerprint verification mode is supported; andinstruct running the designated non-contact application in the mobile payment terminal to execute a payment operation, if the designated non-contact application has passed fingerprint verification or does not support the fingerprint verification mode,
- The mobile payment terminal according to claim 6, wherein the mobile payment terminal is a mobile phone.
- The mobile payment terminal according to claim 6, wherein the embedded security element further comprises an application registry that can be accessed by the fingerprint triggering module, wherein the application registry saves fingerprint identification information associated with the non-contact application residing in the mobile payment terminal, the fingerprint identification information comprising an identifier indicating whether the non-contact application supports the fingerprint verification mode and a status flag indicating whether the fingerprint verification is passed when the fingerprint verification mode is supported.
- The mobile payment terminal according to claim 8, wherein the embedded security element further comprises a fingerprint identification processing module which is configured to update the status flag in the application registry based on a result of fingerprint verification of the fingerprint verification unit.
- The mobile payment terminal according to claim 8, wherein the fingerprint triggering module is configured to determine whether the fingerprint verification is passed in the following manner:a) reading the status flag;b) if the status flag is a first set value, determining that the designated non-contact application has passed the fingerprint verification, and if the status flag is a second set value, determining that the designated non-contact application has not passed the fingerprint verification;c) if the status flag is a third set value, executing a fingerprint verification process and repeating steps a) and b), wherein in the process of executing fingerprint verification, if the fingerprint verification is passed, the status flag is set at the first set value by the fingerprint identification processing module, otherwise it is set at the second set value by the fingerprint identification processing module; andd) resetting the status flag at a third set value by the fingerprint identification processing module after the status flag has been set at the first set value or the second set value for a preset period of time.
- The mobile payment terminal according to claim 6, wherein the designated non-contact application runs in the embedded security element.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610270230.9A CN105704332B (en) | 2016-04-27 | 2016-04-27 | Mobile payment method and device |
PCT/CN2017/077989 WO2017185926A1 (en) | 2016-04-27 | 2017-03-24 | Mobile payment method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3451265A1 true EP3451265A1 (en) | 2019-03-06 |
EP3451265A4 EP3451265A4 (en) | 2019-10-23 |
Family
ID=56217723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17788579.5A Ceased EP3451265A4 (en) | 2016-04-27 | 2017-03-24 | Mobile payment method and apparatus |
Country Status (7)
Country | Link |
---|---|
US (1) | US20190318340A1 (en) |
EP (1) | EP3451265A4 (en) |
JP (1) | JP6675498B2 (en) |
CN (1) | CN105704332B (en) |
CA (1) | CA3026587C (en) |
TW (1) | TWI696132B (en) |
WO (1) | WO2017185926A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105704332B (en) * | 2016-04-27 | 2020-02-28 | 中国银联股份有限公司 | Mobile payment method and device |
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
GB201702795D0 (en) * | 2017-02-21 | 2017-04-05 | Mastercard International Inc | Contactless interaction system, apparatus and method |
CN107423594B (en) * | 2017-03-08 | 2019-05-21 | Oppo广东移动通信有限公司 | A kind of fingerprint method of payment and terminal device |
CN109427157B (en) * | 2017-08-22 | 2021-03-26 | 佛山市顺德区顺达电脑厂有限公司 | Touch computer device for financial transaction payment and management method thereof |
US10715536B2 (en) * | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
CN108764929A (en) * | 2018-06-12 | 2018-11-06 | 飞天诚信科技股份有限公司 | A kind of IC card and its working method with fingerprint identification function |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
WO2020191547A1 (en) * | 2019-03-22 | 2020-10-01 | 华为技术有限公司 | Biometric recognition method and apparatus |
TWI752319B (en) * | 2019-05-08 | 2022-01-11 | 華南商業銀行股份有限公司 | Financial transaction system and method of operation thereof |
CN112132122B (en) * | 2020-11-26 | 2021-03-16 | 飞天诚信科技股份有限公司 | Fingerprint card and implementation method thereof |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070292006A1 (en) * | 1996-08-07 | 2007-12-20 | Johnson Alice A | Fingerprint compiler program of explanation |
CN102103683A (en) * | 2009-12-17 | 2011-06-22 | 中兴通讯股份有限公司 | Method and device for realizing card simulation application of NFC mobile terminal |
US9436940B2 (en) * | 2012-07-09 | 2016-09-06 | Maxim Integrated Products, Inc. | Embedded secure element for authentication, storage and transaction within a mobile terminal |
US10726668B2 (en) * | 2013-03-01 | 2020-07-28 | Igt | Transfer verification of mobile payments |
CN103268547A (en) * | 2013-06-04 | 2013-08-28 | 北京邮电大学 | NFC (Near Field Communication) mobile phone payment system with fingerprint authentication mechanism |
CN103455913B (en) * | 2013-08-26 | 2017-09-19 | 天地融科技股份有限公司 | NFC payment, device, system and mobile terminal |
WO2015039117A1 (en) * | 2013-09-16 | 2015-03-19 | Sonavation, Inc. | System for verifying an identity of a card holder |
US10121144B2 (en) * | 2013-11-04 | 2018-11-06 | Apple Inc. | Using biometric authentication for NFC-based payments |
US9271150B2 (en) * | 2013-11-12 | 2016-02-23 | Lg Electronics Inc. | Mobile terminal and control method thereof |
US20170169435A1 (en) * | 2014-01-31 | 2017-06-15 | Via International Service Association | Method and system for authorizing a transaction |
CN103927658A (en) * | 2014-04-08 | 2014-07-16 | 深圳市中兴移动通信有限公司 | Mobile payment method and terminal |
US9578023B2 (en) * | 2014-11-14 | 2017-02-21 | Motorola Solutions, Inc. | Identity assertion based on biometric information |
CN104574086A (en) * | 2014-12-29 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Payment method, device and terminal |
GB201423362D0 (en) * | 2014-12-30 | 2015-02-11 | Mastercard International Inc | Trusted execution enviroment (TEE) based payment application |
CN104732390B (en) * | 2015-04-20 | 2018-06-19 | 广东欧珀移动通信有限公司 | Method of payment and device based on NFC |
CN104933556A (en) * | 2015-05-27 | 2015-09-23 | 小米科技有限责任公司 | Mode setting method and apparatus |
US10409972B2 (en) * | 2015-08-19 | 2019-09-10 | Huawei Technologies Co., Ltd. | Fingerprint recognition method and mobile terminal |
US10127539B2 (en) * | 2015-09-30 | 2018-11-13 | Bank Of America Corporation | System for tokenization and token selection associated with wearable device transactions |
CN105354706A (en) * | 2015-10-08 | 2016-02-24 | 广东欧珀移动通信有限公司 | NFC secure payment method and system |
CN105704332B (en) * | 2016-04-27 | 2020-02-28 | 中国银联股份有限公司 | Mobile payment method and device |
US10037420B1 (en) * | 2017-05-17 | 2018-07-31 | American Express Travel Related Services Copmany, Inc. | Cardless transactions |
-
2016
- 2016-04-27 CN CN201610270230.9A patent/CN105704332B/en active Active
-
2017
- 2017-03-24 EP EP17788579.5A patent/EP3451265A4/en not_active Ceased
- 2017-03-24 WO PCT/CN2017/077989 patent/WO2017185926A1/en active Application Filing
- 2017-03-24 US US16/096,779 patent/US20190318340A1/en not_active Abandoned
- 2017-03-24 CA CA3026587A patent/CA3026587C/en active Active
- 2017-03-24 JP JP2018555629A patent/JP6675498B2/en active Active
- 2017-03-30 TW TW106110887A patent/TWI696132B/en active
Also Published As
Publication number | Publication date |
---|---|
CA3026587A1 (en) | 2017-11-02 |
WO2017185926A1 (en) | 2017-11-02 |
CN105704332B (en) | 2020-02-28 |
JP2019521407A (en) | 2019-07-25 |
EP3451265A4 (en) | 2019-10-23 |
JP6675498B2 (en) | 2020-04-01 |
TWI696132B (en) | 2020-06-11 |
CA3026587C (en) | 2021-06-01 |
US20190318340A1 (en) | 2019-10-17 |
CN105704332A (en) | 2016-06-22 |
TW201738814A (en) | 2017-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3026587C (en) | Mobile payment method and device | |
KR102622185B1 (en) | Mobile payment devices and mobile payment systems | |
US11741455B2 (en) | Systems and methods for providing near field communications | |
US11216549B2 (en) | Security verification method and device | |
US11068676B2 (en) | Service processing method, device and apparatus | |
KR102485830B1 (en) | Processing for secure information | |
US9288107B2 (en) | Method and system for controlling operations in a mobile communication device that is enabled for near field communication (NFC) | |
US9747597B2 (en) | Mobile device and authentication method for mobile payment system | |
US20120149331A1 (en) | Method and system for remote control of smart card | |
US8768300B2 (en) | Remote control method and system for smart card | |
EP3239913A1 (en) | Method and device for controlling information transmission, and smart terminal | |
EP2775739B1 (en) | Near-field communications and routing | |
US20150058213A1 (en) | Preventative security for credential transmission using smart cards | |
US20180053177A1 (en) | Resource transfer method, apparatus and storage medium | |
CN105117908B (en) | Transaction payment prompting method and electronic equipment | |
US20140150104A1 (en) | Electronic assembly comprising a disabling module | |
CN111581994A (en) | Near Field Communication (NFC) communication method and device and electronic equipment | |
EP3817415B1 (en) | Method and device for configuring nfc smart card | |
WO2017166421A1 (en) | Login account switching management method and terminal | |
US20160260073A1 (en) | Device and method for facilitating a transaction | |
US20140229372A1 (en) | Smart card having multiple payment instruments | |
CN112989851A (en) | NFC card activation method and device and electronic equipment | |
EP3036927B1 (en) | Contactless communication object able to communicate with an nfc reader | |
KR102099739B1 (en) | How to manage secure elements | |
CN111913773A (en) | NFC card control method, NFC card control device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20181025 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20190923 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 20/42 20120101AFI20190917BHEP Ipc: G06Q 20/40 20120101ALI20190917BHEP Ipc: G06Q 20/32 20120101ALI20190917BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200807 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20211223 |